Post-Conference Workshops (November 7, 2014)

Workshop Chairs

Cliff Wang
Army Research Office, USA
Dijiang Huang
Arizona State University, USA
 
You may contact the chairs at: ccs14workshopchairs@googlegroups.com
 

Workshop Abstracts

  • Security Information Workers (SIW)

    The human element is often considered the weakest element in security. Although many kinds of humans interact with systems that are designed to be secure, one particular type of human is especially important, the security information worker. Security information workers include software developers, system administrators, and intelligence analysts. This workshop aims to develop and stimulate discussion about security information workers.

  • Artificial Intelligence and Security (AISec)

    The potential for applying artificial intelligence (AI), machine learning, and data mining to security and privacy problems is ever-more lucrative. The analytic tools and intelligent behavior provided by these techniques makes AI and learning increasingly important for autonomous real-time analysis and decision-making in domains with a wealth of data or that require quick reactions to ever-changing situations. Particularly, these intelligent technologies offer new solutions to security problems involving Big Data analysis, which can be scaled through cloud-computing. The AISec workshop provides a venue for presenting and discussing new developments in this fusion of security/privacy with AI and machine learning.

  • Smart Energy Grid Security (SEGS)

    The Smart Energy Grid Security (SEGS) Workshop aims to foster innovative research and discussion about smart energy grid security and privacy challenges, issues, approaches, and solutions. The scope of the workshop encompasses all aspects of the smart grid, including distribution, transmission, generation, metering, e-mobility, and integration of distributed energy resources. The scope of the workshop encompasses all aspects of the smart grid, including distribution, transmission, generation, metering, e-mobility, and integration of distributed energy resources.

  • Security and Privacy in Smartphones and Mobile Devices (SPSM)

    Mobile devices such as smartphones and Internet tablets have achieved computing and networking capabilities comparable to traditional personal computers. The operating systems supporting these new devices have both advantages and disadvantages with respect to security. On one hand, they use application sandboxing to contain exploits and limit privileges given to malware. On the other hand, they routinely collect and organize many forms of security- and privacy-sensitive information and make that information easily accessible to third-party applications.This workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas. The workshop will deepen our understanding of various security and privacy issues on smartphones.

  • Cloud Computing Security Workshop (CCSW)

    Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing.